APlus

Wrong  ||  Aplus Videos

Numbers

8

802.11a
5GHz wireless network standard; theoretical maximum throughput of 54 Mbps.
802.11b
2.4GHz wireless network standard; theoretical maximum throughput of 11 Mbps. Susceptible to microwave oven interference.
802.11g
2.4GHz wireless network standard; theoretical maximum throughput of 54 Mbps. Backwards compatible with 802.11b.
802.11n
Operates in BOTH 5GHz and 2.4GHz bands, wireless network standard; uses MIMO (Multiple In/Multiple Out), achieves a theoretical maximum throughput of 100+ Mbps.
802.11ac
5GHz wireless network standard; uses MIMO (Multiple In/Multiple Out) theoretical maximum throughput of 51+ Gbps.

10

10baseT
10mbps baseband twister pair.

1000baseT
5GHz wireless network standard; uses MIMO (Multiple In/Multiple Out) theoretical maximum throughput of 51+ Gbps.

10GbbaseT
10 Gbps.

——- ——- ——-

A-Z

A

Active Directory
Directory Server using LDAP (Lightweight Directory Access Protocol) protocol and DNS (Domain Name System).

B

Bluetooth
Maximum data transmission speed for Bluetooth is 3 Mbps.

C
D

DA-15 Port
15-pin Joystick Port, commonly used in gaming. Usually included on sound cards, usually black. Also sometimes called MIDI ports.

DDR2 SDRAM
Uses differential pairs of signal wires to allow faster signalling without noise and interference problems to achieve higher throughput. Uses 1.8 V and fetches 4 bits of data per clock cycle instead of 2 as with DDR SDRAM. Use Fine Pitch Ball Grid Array (FBGA) packaging rather than the Thin Small Outline Package (TSOP) chip packaging used by most DDR and conventional SDRAM chips.

DHCP
Dynamic Host Configuration Protocol: The Dynamic Host Configuration Protocol is a network management protocol used on Internet Protocol networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks.

DNS
Domain Name Service: Converts domain names to IP address.

E
F

FTP
File Transfer Protocol: Allows upload and download of files. It is a Connection Oriented Protocol which uses TCP for the transfer.

G
H

Hyper-Threading (HT)
Sometimes called “simultaneous multithreading”; enables CPU to run more than one thread at once.

I

IaaS
Cloud-hosted provider of virtualized servers networks.

IMAP4
Internet Message Access Protocol version 4: Retrieves e-mail using TCP port 143

IMEI vs. IMSI
IMSI = International Mobile Subscriber Identity. This is a unique identifier that defines a subscriber in the wireless world, including the country and mobile network to which the subscriber belongs. It has the format MCC-MNC-MSIN. MCC = Mobile Country Code (e.g. 310 for USA); MNC = Mobile Network Code (e.g. 410 for AT&T), MSIN = sequential serial number. All signaling and messaging in GSM and UMTS networks uses the IMSI as the primary identifier of a subscriber.
The IMSI is one of the pieces of information stored on a SIM card.
IMEI is short for International Mobile Equipment Identity and is a unique number given to every single mobile phone, typically found behind the battery.
IMEI numbers of cellular phones connected to a GSM network are stored in a database (EIR – Equipment Identity Register) containing all valid mobile phone equipment.
When a phone is reported stolen or is not type approved, the number is marked invalid.*#06#

IPv6
Improvements over IPv4 include “Some header fields have been dropped or made optional” and “The IP header options allow more efficient forwarding and less rigid length limits”.

 

J
K
L

LDAP
Lightweight Directory Access Protocol; open cross-platform protocol for directory service authentication.  Used to get information from a server.  Used for accessing and modifying directory services such as email addresses.

M

MAC FILTER
Hexadecimal; Can filter devices from accessing wireless network.

N

NAT
Network Address Translation: Translates a set of IP addresses to another set of IP addresses; such as private IPs to public, public IPs to private.

O

Overclocking
Can be set up on the RAM, System Bus and Processor.

P

PaaS
Platform As A Service: Cloud-based, gives programmers tools needed to deploy, administer and maintain a Web application.

PCI Express devices
Use 8-pin power connector.

POP3
Post Office Protocol 3: One of 2 protocols receiving email from SMTP servers.  POP3 used TCP port 110.  Superseded by IMAP4.

Port Settings, common
all TCP protocols unless noted
* “well-known” ports, must memorize
*21 = FTP
22 = SSH
*23 = Telnet
*25 = SMTP
*53 = DNS; UDP
*80 = HTTP; TCP or UDP
*110 = POP3
*143 = IMAP
*443 = HTTPS
*3389 = RDP
137-139 = NetBIOS/NetBT
445 = SMB/CIFS
427 = SLP
548 = AFP
67/68 = DHCP
389 = LDAP
161/162 = SNMP

Power Good
Signal sent from power supply to motherboard.  Board must receive for system to boot on.  Sent at +5 voltage..

PRL
Preferred Roaming List

Q
R
RG RATINGS

RG-58

Used BNC connectors

RG-59

RG-6

Uses F-type connectors.

S

SaaS
Software As A Service: Cloud-based service to store, distribute and update programs and applications. Compare IaaS, PaaS.

SMB
Server Message Block: MS computers, enables users to access shared files on servers using Linux and Unix.

SFTP
Secure File Transfer Protocol: Similar to FTP, uses secure shell during transfer.

S/MIME
Secure/Multipurpose Internet Mail Extensions: Configures digital signature settings for email.

SNMP
Simple Network Management Protocol: Used for network management, collects data from various network devices such as routers, printer, servers.

SOHO
Small Office Home Office.

SSH
Secure Shell: Better alternative to Telnet; prevents data theft.

SSID
System Set Identifier: used to identify a wireless network you wish to connect to. Configuration found in wireless settings, one of the areas where users require the most assistance with their laptops and common mobile devices. Networks that do not broadcast SSIDs will be listed as Hidden Network. To connect, select the Hidden Network and enter the SSID and password.

SSL Settings
Configure by going to Internet Options > Advanced tab.

SDRAM
Synchronous DRAM designed to run in synchronization with the memory bus. A high-speed clocked interface is used by SDRAM to deliver info in very high-speen bursts. SDRAM used in older AGP 2x/4x low-end video cards and chipsets. Does not transfer 4 bits per clock cycle but uses 1.8 V.

SGRAM
Synchronous Graphics RAM; similar to SDRAM in sync capability with high-speed buses up to 200 MHz.

SUBNET MASK CLASSES

CLASS
FIRST OCTET ADDRESS
DEFAULT SUBNET MASK
COMBINATIONS
A
1-126
255.0.0.0
16Mhosts/126networks
B
128-191
255.255.0.0
65Khosts/16Knetworks
C
192-223
255.255.255.0
254hosts/2Mnetworks

127 is reserved for loopback testing.

T

TCP vs. UDP
TCP = Transmission Control Protocol: Developed by DoD, enables dissimilar computers to share information over networks.  Connection-oriented protocol, must first acknowledge a session between 2 computers, using 3-way handshake.  1. SYN 2. SYN ACK 3. ACK RECEIVED.  Guarantees delivery, will re-send data.
UDP = User Datagram Protocol: unreliable and connectionless protocol, superseded by TCP, UDP header is 8-bytes fixed and simple header, while for TCP it may vary from 20 bytes to 60 bytes.  Sessionless.  Does not establish connection, does not guarantee delivery.  Faster than TCP.
See also LDAP.

TKIP
Dynamic Host Configuration Protocol: The Dynamic Host Configuration Protocol is a network management protocol used on Internet Protocol networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks.

U
V
W

WEP
Wired Equivalent Privacy: 40 bits, easily hacked.

WPA
Wi-Fi Protected Access: Uses TKIP (Temporary Key Integration Protocol), stronger security method than WEP, and uses EAP (Extensible Authentication Protocol) which verifies authorized network users.

WPA2
Wi-Fi Protected Access 2: Uses CCMP (Computer Cypher Mode w/ Block Chaining Message Authentication Code Protocol), on all certified Wi-Fi hardware since 2006.

WPS
Wi-Fi Protected Setup: Increases ease of setup.
See also MAC FILTER

X
Y
Z